1. Hardware
- Definition: Physical components that make up a computer system.
- Core components
- CPU (Central Processing Unit) – Executes instructions (e.g., Intel i5, AMD Ryzen 5).
- Memory (RAM) – Stores data temporarily while programmes run (typical 4 GB–16 GB for students).
- Primary storage – SSDs (fast, reliable) or HDDs (larger capacity, slower).
- Secondary/portable storage – USB flash drives, external hard‑drives, SD cards, cloud storage.
- Input devices – Keyboard, mouse, touch‑screen, scanner, microphone, webcam.
- Output devices – Monitor, printer, speakers, projector.
- Peripherals – Docking stations, VR headsets, game controllers.
- Everyday examples
- Smartphone – integrates CPU, RAM, SSD, touchscreen, camera, and wireless radios.
- Interactive whiteboard – large display + touch sensor + built‑in PC.
2. Software
- System software – Operating systems that manage hardware resources (Windows, macOS, Linux, Android, iOS).
- Application software – Performs specific tasks:
- Word processing (Microsoft Word, Google Docs)
- Spreadsheets (Excel, Google Sheets)
- Presentation software (PowerPoint, Prezi)
- Database software (Microsoft Access, MySQL)
- Web browsers (Chrome, Firefox, Edge)
- Graphics editors (GIMP, Photoshop)
- Multimedia players (VLC, Windows Media Player)
- Utility software – Antivirus, backup tools, file‑compression (ZIP, RAR), disk‑defragmenters.
- Software licensing
- Free‑ware – free to use, often with limited features.
- Share‑ware – free trial, then pay for full version.
- Open‑source – source code available; can be modified (e.g., Linux).
- Commercial – licence required, often with restrictions on copying.
3. Input, Output & Storage Devices
- Input – Keyboard, mouse, touchpad, stylus, scanner, microphone, webcam.
- Output – Monitor, printer, speakers, projector, headphones.
- Storage
- Primary: SSD, HDD.
- Secondary: USB flash drive, external HDD/SSD, SD card.
- Cloud: Google Drive, OneDrive, Dropbox (requires internet).
4. Networks
- Types of networks
- LAN (Local Area Network) – limited to a single building or campus (e.g., school computer lab).
- WAN (Wide Area Network) – covers large geographic areas; the Internet is the largest WAN.
- Wireless networks – Wi‑Fi (802.11ac/ax), Bluetooth, mobile data (3G/4G/5G).
- Network topologies
- Star – all devices connect to a central switch/router (most common).
- Bus – devices share a single communication line (rare today).
- Ring – each device connects to two neighbours, data travels in one direction.
- Mesh – multiple paths between devices; high reliability (used in some campus Wi‑Fi).
- Network hardware – Router, switch, modem, access point, network interface card (NIC), firewall appliance.
- IP addressing
- IPv4 – 32‑bit address (e.g., 192.168.1.10). Supports ~4.3 billion addresses.
- IPv6 – 128‑bit address (e.g., 2001:0db8::1). Provides virtually unlimited addresses.
- Basic network security
- Firewalls – filter incoming/outgoing traffic.
- Encryption – WPA2/WPA3 for Wi‑Fi, HTTPS for web traffic.
- Strong passwords & 2FA for router admin accounts.
5. Effects of Using ICT
- Positive effects
- Improved communication – email, video‑calls, instant messaging.
- Instant access to information – research, e‑learning platforms.
- Automation of routine tasks – spreadsheets, macros, scheduling.
- Economic growth – new jobs, e‑commerce.
- Negative effects
- Digital divide – unequal access to devices and broadband.
- Health concerns – eye strain, poor posture, repetitive‑strain injury.
- Environmental impact – e‑waste, energy consumption of data‑centres.
- Social issues – cyber‑bullying, privacy loss, online addiction.
- Security threats – malware, phishing, identity theft.
6. ICT Applications (selected examples)
| Sector | Typical Application | Real‑world example |
|---|
| Education | Virtual classrooms, LMS, digital assessment | Google Classroom delivering assignments |
| Business | e‑Commerce, POS, CRM, ERP | Online shop (Shopify) + inventory system |
| Banking & Finance | Online banking, ATMs, fraud‑detection systems | ATM cash‑withdrawal workflow |
| Health | Telemedicine, electronic patient records | Video consultation via NHS App |
| Government | e‑Government services, digital IDs, online tax filing | HMRC online self‑assessment |
| Retail | Barcode scanners, stock‑control, self‑checkout | Supermarket self‑service tills |
| Transportation | GPS tracking, ticketing, traffic‑management | Real‑time bus arrival apps |
| Entertainment | Streaming, online gaming, digital publishing | Netflix video‑on‑demand |
7. Systems Development Life‑Cycle (SDLC)
- Planning
- Define objectives, scope and feasibility (technical, economic, legal).
- Produce a project brief and obtain stakeholder approval.
- Analysis
- Gather user requirements (interviews, questionnaires, observation).
- Create a requirements specification (functional & non‑functional).
- Design
- Data‑flow diagrams (DFDs) and entity‑relationship diagrams (ERDs).
- UI mock‑ups, screen layouts, navigation flow.
- Choose hardware, software and network architecture.
- Implementation
- Write or adapt code, configure hardware/software.
- Data migration from legacy systems.
- Choose an implementation method: direct change‑over, parallel, pilot or phased.
- Testing
- Unit testing – individual components.
- Integration testing – combined modules.
- User‑acceptance testing (UAT) – real users verify requirements.
- Document test results and fix defects.
- Deployment
- Install system on live environment, train users, produce user manuals.
- Perform a post‑implementation review.
- Maintenance
- Corrective (bug fixes), adaptive (environment changes), perfective (enhancements), preventive (future‑proofing).
- Regular backups, updates and security patches.
8. Safety and Security
8.1 Physical Safety
- Keep cables tidy and away from walkways to avoid trips.
- Never handle electrical devices with wet hands – risk of shock.
- Use surge protectors for computers and peripherals.
- Store laptops, tablets and phones in padded cases when transporting.
8.2 e‑Safety Checklist
- Passwords – Minimum 12 characters, mix of upper‑/lower‑case, numbers, symbols; avoid dictionary words; use a password manager.
- Two‑Factor Authentication (2FA) – Enable wherever possible (authenticator app or hardware token).
- Malware protection – Install reputable anti‑virus/anti‑malware, keep signatures up‑to‑date, scan downloads before opening.
- Phishing detection
- Check sender’s email address for misspellings.
- Hover over links to view the real URL.
- Never provide personal or financial details in unsolicited messages.
- Safe cloud use – Store non‑sensitive files; for confidential data use services with end‑to‑end encryption.
- Backup strategy – Follow the 3‑2‑1 rule: three copies, two different media, one off‑site (e.g., external HDD + cloud).
- Software updates – Enable automatic updates for OS, browsers and apps.
- Wi‑Fi security – Use WPA3 (or WPA2) with a strong passphrase; change default router admin credentials.
8.3 Data‑Protection Legislation (Basic Overview)
| Legislation | Key Requirement | Relevance to Students |
|---|
| General Data Protection Regulation (GDPR) | Personal data must be processed lawfully, fairly and transparently; individuals have the right to access, correct and delete their data. | Obtain consent before posting photos of classmates; delete data when no longer needed. |
| Data Protection Act 2018 (UK) | Implements GDPR in the UK; adds specific provisions for children’s data. | Same practical steps as GDPR; schools must have a clear privacy notice. |
| Children’s Online Privacy Protection Act (COPPA) – US | Requires parental consent before collecting personal information from children under 13. | Useful when using US‑based apps or games. |
8.4 Copyright & Software Piracy
- Copyright basics – Protects original literary, artistic, musical and software works.
- Allowed uses – Private study, quotation (with attribution), and fair‑dealing for criticism or review.
- Piracy – Downloading or sharing unauthorised copies of software, music, movies or games is illegal and can lead to fines.
- Legal alternatives – Use open‑source software, Creative Commons‑licensed media, or purchase licences.
8.5 Blocking and Reporting Unwanted Users (Social Media)
- Identify the problem – Harassment, offensive content, suspicious links, or unwanted contact.
- Document evidence – Take screenshots, note dates/times and usernames.
- Block the user – Prevents them from seeing or contacting you.
- Report the user – Use the platform’s built‑in reporting tool; attach evidence and select the appropriate reason.
- Escalate if necessary – Inform a trusted adult, teacher or school‑IT officer; for serious threats contact local authorities.
8.6 Meeting an Online Contact Face‑to‑Face
- Verify identity through a video call and ask for two forms of ID.
- Choose a public, well‑lit location (café, library, school campus).
- Tell a parent/guardian the exact time, place and contact details of the person you are meeting.
- Arrange a check‑in: send a message before you leave and another after you return.
- Never go alone – bring a friend or have an adult accompany you.
- Keep personal devices charged and set to “offline” or “airplane mode” if you feel unsafe.
8.7 Distribution of Inappropriate Images
- Think before you share – once an image is online it can be copied and re‑shared indefinitely.
- Check platform policies – most sites prohibit nudity, hate symbols, graphic violence and personal data of others.
- Use privacy settings – limit the audience to “Friends only” or specific groups.
- If posted by mistake, delete the image immediately and ask anyone who received it to delete it as well.
- Report illegal or harmful content to the platform and, if appropriate, to a trusted adult or the police.
8.8 Using Appropriate Language Online
- Avoid profanity, slurs, threats, bullying or harassing language.
- Remember tone can be mis‑interpreted – be clear, polite and concise.
- Follow each platform’s community guidelines and code of conduct.
- Report abusive language to protect yourself and others.
8.9 Protecting Personal Data (Quick Reference)
| Action | Reason | How to Implement |
|---|
| Do not share others’ personal details without permission | Prevents identity theft and privacy breaches | Ask for consent; use generic terms (“a friend”) if unsure. |
| Use strong, unique passwords | Reduces risk of account compromise | Combine letters, numbers, symbols; change every 6‑12 months; store in a password manager. |
| Enable two‑factor authentication (2FA) | Adds an extra security layer | Activate in account settings; prefer authenticator apps over SMS. |
| Beware of phishing attempts | Protects against fraud and malware | Check sender address, hover over links, verify URLs before clicking. |
| Delete or archive old posts containing personal info | Limits long‑term exposure | Review timelines regularly; use “delete” or “archive” features. |
| Limit location sharing | Reduces risk of physical stalking | Turn off GPS for apps that don’t need it; avoid posting real‑time whereabouts. |
9. Audience
- Identify the audience – Age, prior knowledge, interests, cultural background, accessibility needs.
- Purpose of the ICT product – Inform, persuade, entertain, instruct, or record.
- Copyright considerations
- Use only material you own, have permission for, or that is free‑to‑use (Creative Commons, public domain).
- Always give appropriate credit (author, source, licence).
- Tailoring content – Adjust language (formal vs. informal), layout (simple vs. complex), media (text, images, video) to suit the audience.
10. Communication
- Email etiquette
- Clear subject line.
- Professional greeting (e.g., “Dear Mr Smith”).
- Concise body, bullet points where appropriate.
- Polite sign‑off (e.g., “Kind regards”).
- Proofread for spelling, grammar and tone.
- Internet safety – Do not share personal data, recognise spam, use HTTPS (padlock icon) for secure sites.
- Evaluating online information
- Check author credentials and institutional affiliation.
- Look for recent publication dates.
- Cross‑verify with at least two reliable sources.
- Beware of bias and commercial intent.
- Netiquette – Be polite, avoid ALL CAPS (shouting), respect others’ opinions, use proper punctuation.
11. File Management
- Folder hierarchy – Logical structure (e.g.,
Year_2025/Science/Physics/Notes). - File‑naming conventions
- Short, descriptive names; no spaces (use underscores or hyphens).
- Include version numbers (v1, v2) and dates (YYYYMMDD).
- Example:
Report20250312v2.docx.
- Common file types
- Documents – .docx, .pdf, .odt
- Spreadsheets – .xlsx, .csv, .ods
- Presentations – .pptx, .odp
- Images – .jpg, .png, .gif, .svg
- Compressed – .zip, .rar
- Audio/Video – .mp3, .mp4, .wav
- Backing up files – Follow the 3‑2‑1 rule; schedule automatic backups where possible.
12. Images
- Resolution – DPI (dots per inch) for print (300 DPI typical); 72 DPI for web.
- Colour depth – 24‑bit (true colour) for most images; 8‑bit for simple graphics or icons.
- File formats
- JPEG – lossy compression, good for photographs.
- PNG – lossless, supports transparency.
- GIF – 256 colours, supports simple animation.
- SVG – vector format, scalable without loss.
- Basic editing – Crop, resize, adjust brightness/contrast, add captions, remove background.
- Copyright – Use only images you have permission for; credit the creator; respect licences (e.g., Creative Commons).
13. Layout
- Page setup – Margins (usually 2 cm), orientation (portrait/landscape), paper size (A4).
- Using tables – Organise data, create forms, improve readability; keep headings bold.
- Headers & footers – Include page numbers, document title, author name, date.
- Columns and sections – Break text into manageable blocks; use section breaks for different formatting (e.g., landscape tables).
14. Styles
- Purpose – Ensure consistency, speed up formatting, simplify global changes.
- Common style types
- Paragraph styles – Normal, Heading 1, Heading 2, Quote.
- Character styles – Emphasis, Strong, Code.
- List styles – Bulleted, Numbered, Multi‑level.
- Applying & modifying – Select text → choose a style; to change all instances, modify the style definition.
15. Proofreading
- Run built‑in spell‑check and grammar tools.
- Read the document aloud to catch missing words or awkward phrasing.
- Check consistency of fonts, sizes, headings and spacing.
- Verify facts, dates, calculations and citations.
- Ask a peer or teacher to review for a fresh perspective.
16. Graphs & Charts
- Select data – Ensure accuracy and relevance.
- Choose appropriate type
- Bar chart – compare categories.
- Line graph – show trends over time.
- Pie chart – illustrate parts of a whole.
- Scatter plot – display relationship between two variables.
- Histogram – frequency distribution.
- Label axes – Include units (e.g., “Temperature (°C)”).
- Add title and legend – Make the chart self‑explanatory.
- Format for clarity – Use contrasting colours, avoid 3‑D effects, keep gridlines subtle.
- Interpretation – Write a brief caption explaining the key trend or finding.
17. Document Production
- Start with a suitable template (letter, report, flyer, brochure).
- Set up page layout, margins and styles before adding content.
- Insert objects – images, tables, charts, hyperlinks, footnotes.
- Apply consistent heading hierarchy and paragraph styles.
- Use the “Review” pane for spell‑check, track changes and comments.
- Finalise with print preview, check pagination, and export as PDF for sharing.
18. Databases
- Key concepts
- Table – rows (records) and columns (fields).
- Primary key – unique identifier for each record.
- Field types – Text, Number, Date/Time, Currency, Yes/No.
- Relationships – one‑to‑one, one‑to‑many, many‑to‑many.
- Creating a simple database (e.g., Microsoft Access)
- Define table structure – set field names, data types and primary key.
- Enter data manually or import from a CSV file.
- Create forms for data entry – user‑friendly layout.
- Build queries to retrieve specific information (SELECT, WHERE, ORDER BY).
- Generate reports – group, sort and summarise data.
- Common SQL commands (for GCSE level)
SELECT column1, column2 FROM table WHERE condition;INSERT INTO table (col1, col2) VALUES (val1, val2);UPDATE table SET column = value WHERE condition;DELETE FROM table WHERE condition;
19. Presentations
- Structure – Title slide, agenda, main points (3–5), summary, Q&A.
- Design principles
- Keep slides uncluttered – max 6 lines per slide, 6 words per line.
- Use high‑contrast colour schemes; avoid busy backgrounds.
- Consistent fonts (sans‑serif for readability) and sizes.
- Include relevant images, charts or diagrams to support points.
- Delivery tips – Speak clearly, maintain eye contact, use a remote clicker, rehearse timing.
- Technical checks – Test projector/monitor, ensure media files play, have a backup copy on a USB drive.
20. Spreadsheets
- Core functions – SUM, AVERAGE, COUNT, MIN, MAX.
- Formulas – Use cell references (A1, B2) and operators (+, –, *, /).
- Data analysis tools
- Sorting and filtering.
- Conditional formatting – highlight values that meet criteria.
- Pivot tables – summarise large data sets.
- Charts – bar, line, pie, scatter directly from data ranges.
- Best practice
- Label columns and rows clearly.
- Keep raw data separate from calculations.
- Use named ranges for readability.
- Protect cells that contain formulas to avoid accidental changes.
21. Website Authoring
- Basic HTML structure
<!DOCTYPE html><html lang="en">
<head>
<meta charset="UTF-8">
<title>My Page</title>
<link rel="stylesheet" href="styles.css">
</head>
<body>
<h1>Welcome</h1>
<p>Your content here.</p>
</body>
</html>
- CSS basics
body {font-family: Arial, sans-serif; line-height: 1.5;}h1 {color: #2A7AE2;}
p {margin-bottom: 1em;}
- Accessibility checklist
- Provide alt text for images.
- Use sufficient colour contrast (≥4.5:1).
- Ensure navigation is possible via keyboard.
- Use semantic HTML tags (header, nav, main, footer).
- Publishing – Upload files via FTP or a web‑hosting control panel; test on multiple browsers (Chrome, Firefox, Edge) and devices (desktop, tablet, phone).
- Legal considerations – Include a privacy notice, cookie disclaimer (if applicable), and respect copyright for all media used.